[dns-operations] thoughts on DNSSEC

WBrown at e1b.org WBrown at e1b.org
Thu Jul 19 17:08:57 UTC 2012


James M Galvin <galvin at elistx.com> wrote on 07/19/2012 12:03:22 PM:

> I have evolved to what I consider a more practical view of this issue 
> over the years.  I'm certainly open to reconsideration but here's what 
> I think today in one sentence: as a practical matter this is not a 
> significant problem.

True, but as DNSSEC adoption increases, significance will increase as 
well.
 
> I absolutely believe we have a major gaping hole technically, so don't 
> get me wrong.  We should absolutely be seeking better ways to get child 
> key information in to the parent zone.  But that's a separate 
> discussion.

Agreed, with the proviso that some method to upload key records needs to 
exist for all registrars.  Many of use have seen great strides in software 
ease of use during our lifetimes.  My parents had a neighbor who thought 
the greatest improvement in her lifetime was indoor plumbing.  Someday, 
users will never have experienced insecure DNS queries.
 
> Here's my rationale for what I believe.
> 
> Consider the domain name market in an 80-20 split.  I assert that for 
> 80% of the market none of this will matter.  The 80% portion of the 
> market gets bundled services - domain name, email, web hosting, dns, 
> etc.  In that market their DNSSEC services will simply be provided and 
> they will not know, care, or understand any of the problem you 
> describe.  They will not know the difference between a web site failure 
> or some kind of DNS failure and they won't care.  "Down" for 2 days: oh 
> well.  They are going to get the same level of service for the DNS 
> failures as they do for their web site failures and they deal with this 
> just fine today.  DNSSEC does not change this business model or service.

I'm not sure I know anyone that won't be beaching up a storm with a 2 day 
outage.  We are an organization that provides DNS, email and web hosting 
to over 100 schools and related organizations in the area.  I guess that 
makes us part of the 20% for which this matters.  We rely on outside 
registrars, and unfortunately we've been using Network Solutions for 
years.  Until now, I have not had any complaints about them.  They never 
screwed up anything on me.  I guess if they don't allow me to upload DS 
records, I can't blame them for DNSEC failures.
 
> We can have a discussion of whether or not DNSSEC should change the 
> business model or service.  I happen to think it should.  I also think 
> it will, in time, although I'm not going to try to predict it, except 
> perhaps to talk about events that will show the change is in progress. 
> But that's a separate discussion.
> 
> For the remaining 20% I'll assert that they are technically competent, 
> which means if they have fat finger issues, well, we've all had those 
> problems.  You get what you deserve and pay for.  What I mean is, these 
> folks will either be doing their DNS themselves, because they can, or 
> they will be using a third-party service provider.  In either case, 
> with any luck they will be using a registrar with a higher level of 
> service because they understand the risks and don't want the service 
> interruption.  If they're not then they'll have a "mistake" and they'll 
> change registrars because they will learn from their "mistake".

I like to think I'm somewhat competent, but also recognize I have limits 
on what I know and can do.  I am reading all I can (hence being on this 
list) and testing with a non-production domain.  I have fat fingered BIND 
and brought domains down.  I've blown up mail servers and killed web 
servers.  Own up, apologize and promise to not make the same dumb mistake 
again.

I'm thinking my mistake here was thinking that a registrar would want to 
offer DNSSEC to it's customer.  Perhaps it is time for me to acknowledge 
that mistake and work on moving domains to another registrar.  There will 
be a lot of organizational inertia to overcome here to do so.  When I 
requested transfer code for my personal domain, NetSol was all "boo hoo 
hoo, what can we do to keep you as a customer?"  It's easy.  Lower your 
prices.  I will pay a premium for good service, but they are not providing 
that.  And offer DNSSSEC to your customers.  One of the times I spoke to 
their tech support, the person had no bloody clue what DNSSEC was.  Hell, 
they could have have provided her with a buzzword chart list DNSSEC with a 
"we don't support that yet" answer.  And she would not put me through to 
second tier support, insisting she could help me.
 
> In other words, the probability of a problem for the 20% is much lower 
> than the probability of a problem for the 80%.  And it is the problems 
> in the 20% that will be most visible.  The problems in the 80% will 
> happen but are unlikely to have a significant on anything in particular.

If I'm in the 20%, I'll do my best to prevent the problems.  I hate being 
visible.

See http://dilbert.com/strips/comic/1995-08-18/  One of my all time 
favorites!!


 
> That's what I think.

Thanks for sharing
 
> Jim

Bill




Confidentiality Notice: 
This electronic message and any attachments may contain confidential or 
privileged information, and is intended only for the individual or entity 
identified above as the addressee. If you are not the addressee (or the 
employee or agent responsible to deliver it to the addressee), or if this 
message has been addressed to you in error, you are hereby notified that 
you may not copy, forward, disclose or use any part of this message or any 
attachments. Please notify the sender immediately by return e-mail or 
telephone and delete this message from your system.



More information about the dns-operations mailing list